Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Cybersecurity

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Including ads in mobile apps poses privacy, security risks

    Researchers have found that including ads in mobile applications (apps) poses privacy and security risks; in a recent study of 100,000 apps in the official Google Play market, researchers noticed that more than half contained so-called ad libraries, and that many of the apps included aggressive ad libraries that were enabled to download and run code from remote servers, which raises significant privacy and security concerns

    • Read more
  • Triple-threat computer protection reduces identity theft

    Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft; computer users who were running antivirus, anti-adware, and anti-spyware software were 50 percent less likely to have their credit card information stolen

    • Read more
  • The Red Cross, emergency response, and Twitter

    Social media has become such an integral part of our lives that emergency responders are now turning to Twitter and Facebook to gain valuable information during natural disasters or crises

    • Read more
  • U.K. holds amateur cybersecurity challenge to spur interest in field

    For the past several weeks amateur cybersecurity experts have been searchingfor malware, defending against cyberattacks, and raising firewalls as part of Britain’s Cyber Security Challenge

    • Read more
  • NATO commander target of persistent Facebook cyberattacks

    The senior commander of NATO has been the target of repeated Facebook-based cyberattacks that are believed to have originated from China; Admiral James Stavridis is the subject of a campaign to gain information about him and his colleagues, friends, and family

    • Read more
  • Growing unease over illegal cell phone jammers

    For less than $40 nearly anyone can purchase a cell phone jamming device to prevent those nearby from making calls, which has law enforcement agencies uneasy

    • Read more
  • Cambridge first year student wins U.K. Cybersecrity Challenge competition

    Cyber Security Challenge U.K. announces a winner and unveils this year’s new Challenge program (open for registrations as of yesterday); the winner, Jonathan Millican, competed with thousands of registered candidates in 6-month competition

    • Read more
  • NYC cyberattack simulation to spur Senate cybersecurity legislation

    Last Wednesday, in an attempt to bolster support for cybersecurity legislation, the White House staged a mock cyberattack on New York City’s power supply for the Senate

    • Read more
  • NASA official says hackers gained “full functional control”

    Last week NASA officials disclosed details about the alarming extent that hackers were able to penetrate the agency’s networks

    • Read more
  • Top LulzSec hackers arrested, leader turns them in

    In the ongoing battle between law enforcement officials and hackers, authorities announced on Tuesday that they had arrested leading members of the hacktivist group known as LulzSec after their leader allegedly turned them in

    • Read more
  • MIT, DARPA developing self-healing cloud network

    Researchers at the Massachusetts Institute of Technology (MIT) and the Pentagon’s advanced research arm DARPA are working together to create a self-healing cloud computing network that can defend against cyberattacks

    • Read more
  • DARPA holds $40,000 competition to test social media in disasters

    To better understand how emergency responders can leverage social media tools, the Defense Advanced Research Projects Agency (DARPA) is holding the$40,000 CLIQR Quest Challenge

    • Read more
  • Anonymous retaliates, takes down Interpol site

    In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday

    • Read more
  • Cryptographic attack shows importance of bug-free software

    Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used

    • Read more
  • HP wins $47M contract to support HSPD-12 implementation

    On Monday the U.S. General Services Administration (GSA) announced it had awarded Hewlett Packard a one-year contract worth as much as $47 million to support government-compliance with Homeland Security Presidential Directive-12 (HSPD-12)

    • Read more
  • « first
  • ‹ previous
  • …
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • …
  • next ›
  • last »

More headlines

  • Another cybersecurity False Claims Act settlement
  • Cyber congressman demands answers before CISA gets cut down to size
  • US to sign Pall Mall pact aimed at countering spyware abuses
  • Researchers warn about ‘Goffee’ spilling onto Russian flash drives
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • Time to Invest in Cybersecurity for U.S. Sealift Forces, Report Says
  • President Trump Extends National Emergency With Respect to Significant Cyber Threats for Another Year
  • Senators Press DHS for Details on GPS Jamming Protections
  • Recently-patched Firefox bug exploited against Tor browser users
  • Homeland Security Secretary Alejandro Mayorkas says election disinformation is "extremely damaging"
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Researchers Calculate Cyberattack Risk for All 50 States

    Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies